Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 176

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 176

1. When should an application-level edit check to verify that availability of funds was completed at the electronic funds transfer (EFT) interface?

A) Before transaction completion
B) Immediately after an EFT is initiated
C) During run-to-run total testing
D) Before an EFT is initiated



2. ________________ (fill in the blank) should be implemented as early as data preparation to support data integrity at the earliest point possible.

A) Control totals
B) Authentication controls
C) Parity bits
D) Authorization controls



3. What is used as a control to detect loss, corruption, or duplication of data?

A) Redundancy check
B) Reasonableness check
C) Hash totals
D) Accuracy check



4. Data edits are implemented before processing and are considered which of the following?

A) Deterrent integrity controls
B) Detective integrity controls
C) Corrective integrity controls
D) Preventative integrity controls



5. Processing controls ensure that data is accurate and complete, and is processed only through which of the following?

A) Documented routines
B) Authorized routines
C) Accepted routines
D) Approved routines



1. Right Answer: D
Explanation: An application-level edit check to verify availability of funds should be completed at the electronic funds transfer (EFT) interface before an EFT is initiated.

2. Right Answer: A
Explanation: Control totals should be implemented as early as data preparation to support data integrity at the earliest point possible.

3. Right Answer: C
Explanation: Hash totals are used as a control to detect loss, corruption, or duplication of data.

4. Right Answer: D
Explanation: Data edits are implemented before processing and are considered preventive integrity controls.

5. Right Answer: B
Explanation: Processing controls ensure that data is accurate and complete, and is processed only through authorized routines.

0 Comments

Leave a comment